Profiling and Identifying Individual Users by Their Command Line Usage and Writing Style
Abstract
Full Text:
PDFReferences
V. N.P.Dau, et al., "profiling users in the UNIX OS Environment," 2000.
M. Maia, et al., "Identifying user behavior in online social networks," presented at the Proceedings of the 1st Workshop on Social Network Systems, Glasgow, Scotland, 2008.
J. Vosecky, et al., "User identification across multiple social networks," in Networked Digital Technologies, 2009. NDT '09. First International Conference on, 2009, pp. 360-365.
G. Pannell and H. Ashman, "User Modelling for Exclusion and Anomaly Detection: A Behavioural Intrusion Detection System," Berlin, Heidelberg, 2010, pp. 207-218.
A. A. E. Ahmed and I. Traore, "Detecting computer intrusions using behavioral biometrics," 2005.
D. L. Pepyne, et al., "User profiling for computer security," in Proceedings of the 2004 American Control Conference, 2004, pp. 982-987 vol.2.
C. C. Hung, et al., "Tag-Based user profiling for social media recommendation," 2008.
M. Reformat and S. K. Golmohammadi, "Updating user profile using ontology-based semantic similarity," in Fuzzy Systems, 2009. FUZZ-IEEE 2009. IEEE International Conference on, 2009, pp. 1062-1067.
S. McKinney and D. S. Reeves, "User identification via process profiling: extended abstract," presented at the Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, Oak Ridge, Tennessee, 2009.
C. Dwyer, et al., "Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace," 2007.
P. Bhattacharyya, et al., "Social Network Model Based on Keyword Categorization," in Social Network Analysis and Mining, 2009. ASONAM '09. International Conference on Advances in, 2009, pp. 170-175.
M. Takeda, et al., "Discovering Characteristic Expressions from Literary Works: a New Text Analysis Method beyond N-Gram Statistics and KWIC," Berlin, Heidelberg, 2000, pp. 112-126.
M. Balduzzi, et al., "Abusing Social Networks for Automated User Profiling," in Recent Advances in Intrusion Detection. vol. 6307, S. Jha, et al., Eds., ed: Springer Berlin / Heidelberg, 2010, pp. 422-441.
G. Pannell and H. Ashman, "User Modelling for Exclusion and Anomaly Detection: A Behavioural Intrusion Detection System," in User Modeling, Adaptation, and Personalization. vol. 6075, P. De Bra, et al., Eds., ed: Springer Berlin / Heidelberg, 2010, pp. 207-218.
W. Wei, et al., "Profiling program and user behaviors for anomaly intrusion detection based on non-negative matrix factorization," in Decision and Control, 2004. CDC. 43rd IEEE Conference on, 2004, pp. 99-104 Vol.1.
DOI: http://dx.doi.org/10.17977/um018v1i22018p55-63
Refbacks
- There are currently no refbacks.
Copyright (c) 2018 Knowledge Engineering and Data Science

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.